ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Five Steps to Effective Third-Party Access Governance

    Sponsored by: Saviynt

    Attracting and retaining employees has become more complicated. Most organizations don't know how many third-party relationships they have. Saviynt Identity Cloud combines multiple identity management capabilities into a single cohesive platform to unify controls and risk management for every identity, app, and cloud across your business.

  • Ransomware Revealed: How to Determine If You’re a Target

    Sponsored by: Bitdefender

    Ransomware has become a booming business, complete with its own ecosystem of suppliers, specializations, and affiliate programs. Similarly, detecting and stopping a ransomware attack requires a coordinated effort — one that is risk-informed. In this eBook, learn how to evaluate your organization’s risk in the face of rising ransomware threats.

  • Communicating Culture to Attract Top Talent

    Sponsored by: GEM

    Discover the elements of a strong recruitment marketing strategy to attract top talent. Learn how to define your EVP, create candidate personas, leverage social media, and more. Download this e-book to build an effective inbound recruiting program.

  • Oracle EBS – 1099 Process Update

    Sponsored by: Spinnaker Support

    With the IRS recently introducing a new API to help organizations comply with 10 + 1099s e-filing mandates, many are having issues with integrating the API into their daily operations. Enter Spinnaker Support, who can help you fix these errors. Access this white paper to gain more insight.

  • Case Study: M&A in action - How Majestic Wine paired with Naked Wines to fuel cloud-led digital transformation

    Sponsored by: TechTarget ComputerWeekly.com

    Find out how the acquisition of online-only wine retailer Naked Wines in 2015 has shaped the digital transformation plans of its parent company Majestic Wine

  • Europe’s controversial digital vision for the next decade

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.

  • Europe's controversial digital vision for the next decade

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.

  • Nordics are leading the datacentre revolution

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region has space, access to renewable energy, a cool climate and a well-educated workforce. All these things make it a great place to build a datacentre. Read in this e-guide how the Nordic region is leading the datacentre revolution.

  • Doing More With Less Cost-Effective Application Security And Performance Strategies From 7 Companies.

    Sponsored by: Cloudflare

    While the cost of security breaches continues to increase, many security teams have found ways of achieving success with limited resources. This white paper shares real-life stories of companies that have successfully created efficiencies and cut costs in their application security strategy. Download now to discover more.

  • How to Democratize Analytics

    Sponsored by: Alteryx

    Data democratization is a challenging, ongoing process that requires a clear strategy and buy-in from crucial people within your business. Download this guide to identify and address democratization challenges, learn what you need to do to successfully democratize, and discover the ROI you could see from your efforts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.